ppid-spoofing
Here are 6 public repositories matching this topic...
Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls.
-
Updated
Jan 11, 2026 - C
Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/AV evasion.
-
Updated
Jan 22, 2026 - C++
The project consists of a service that utilizes advanced techniques to inject a Payload into its own process, specifically the Windows RuntimeBroker.exe
-
Updated
Jul 3, 2024 - C
🛡️ Explore a simple Windows usermode rootkit for educational purposes, showcasing privilege escalation, stealth features, and remote management capabilities.
-
Updated
Jan 2, 2026
Improve this page
Add a description, image, and links to the ppid-spoofing topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ppid-spoofing topic, visit your repo's landing page and select "manage topics."